Diverse Hardware Hacking Handbook: Embedded Security und Hardware Angriffe

Umfassende Anleitung zu Hardware-Angriffen auf eingebettete SystemeThemen wie Bedrohungsmodellierung und AngriffsbäumeAnalyse von Hardware-Schnittstellen und KommunikationsprotokollenEinblicke in reale Angriffe auf Geräte wie PlayStation 3 und Xbox 360Ausführliches Equipment-Appendix für das Hardware-Hacking-LaborGeeignet für Ingenieure, Studenten und Elektronik-Hobbyisten
wenigermehr
Anzeige

Beste Angebote

29,99
Versand: frei!
35,99
Versand: frei!
35,99
Versand: frei!
Anzeige

Preisvergleich

Inkl. Versand
Sortieren:
Beste Treffer
The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks 1593278748
The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks
prodImage
29,99
29,99
Versand: frei!
Versand: frei!
Random House LLC US The Hardware Hacking Handbook A1047861168
The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides you through each hack on real hardware. Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they re everywhere in phones, cars, credit cards, laptops, medical equipment, even critical infrastructure. This means understanding their security is critical. The Hardware Hacking Handbook takes you deep inside different types of embedded systems, revealing the designs, components, security limits, and reverse-engineering challenges you need to know for executing effective hardware attacks. Written with wit and infused with hands-on lab experiments, this handbook puts you in the role of an attacker interested in breaking security to do good. Starting with a crash course on the architecture of embedded devices, threat modeling, and attack trees, you ll go on to explore hardware interfaces, ports and communication protocols, electrical signaling, tips for analyzing firmware images, and more. Along the way, you ll use a home testing lab to perform fault-injection, side-channel (SCA), and simple and differential power analysis (SPA/DPA) attacks on a variety of real devices, such as a crypto wallet. The authors also share insights into real-life attacks on embedded systems, including Sony s PlayStation 3, the Xbox 360, and Philips Hue lights, and provide an appendix of the equipment needed for your hardware hacking lab like a multimeter and an oscilloscope with options for every type of budget. You ll learn: How to model security threats, using attacker profiles, assets, objectives, and countermeasures Electrical basics that will help you understand communication interfaces, signaling, and measurement How to identify injection points for executing clock, voltage, electromagnetic, laser, and body-biasing fault attacks, as well as practical injection tips How to use timing and power analysis attacks to extract passwords and cryptographic keys Techniques for leveling up both simple and differential power analysis, from practical measurement tips to filtering, processing, and visualization Whether you re an industry engineer tasked with understanding these attacks, a student starting out in the field, or an electronics hobbyist curious about replicating existing work, The Hardware Hacking Handbook is an indispensable resource one you ll always want to have onhand.
prodImage
35,99
35,99
Versand: frei!
Versand: frei!
Random House LLC US The Hardware Hacking Handbook
The Hardware Hacking Handbook takes you deep inside embedded devices to show how different kinds of attacks work, then guides you through each hack on real hardware. Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they re everywhere in phones, cars, credit cards, laptops, medical equipment, even critical infrastructure. This means understanding their security is critical. The Hardware Hacking Handbook takes you deep inside different types of embedded systems, revealing the designs, components, security limits, and reverse-engineering challenges you need to know for executing effective hardware attacks. Written with wit and infused with hands-on lab experiments, this handbook puts you in the role of an attacker interested in breaking security to do good. Starting with a crash course on the architecture of embedded devices, threat modeling, and attack trees, you ll go on to explore hardware interfaces, ports and communication protocols, electrical signaling, tips for analyzing firmware images, and more. Along the way, you ll use a home testing lab to perform fault-injection, side-channel (SCA), and simple and differential power analysis (SPA/DPA) attacks on a variety of real devices, such as a crypto wallet. The authors also share insights into real-life attacks on embedded systems, including Sony s PlayStation 3, the Xbox 360, and Philips Hue lights, and provide an appendix of the equipment needed for your hardware hacking lab like a multimeter and an oscilloscope with options for every type of budget. You ll learn: How to model security threats, using attacker profiles, assets, objectives, and countermeasures Electrical basics that will help you understand communication interfaces, signaling, and measurement How to identify injection points for executing clock, voltage, electromagnetic, laser, and body-biasing fault attacks, as well as practical injection tips How to use timing and power analysis attacks to extract passwords and cryptographic keys Techniques for leveling up both simple and differential power analysis, from practical measurement tips to filtering, processing, and visualization Whether you re an industry engineer tasked with understanding these attacks, a student starting out in the field, or an electronics hobbyist curious about replicating existing work, The Hardware Hacking Handbook is an indispensable resource one you ll always want to have onhand.
prodImage
35,99
35,99
Versand: frei!
Versand: frei!
No Starch Press The Hardware Hacking Handbook, Fachbücher von Colin O'Flynn, Jasper van Woudenberg
Das "Hardware Hacking Handbook" bietet eine umfassende Analyse von Hardwareangriffen auf eingebettete Systeme, verfasst von den anerkannten Experten Jasper van Woudenberg und Colin O'Flynn. Dieses Fachbuch richtet sich an alle, die sich für das Design, die Analyse und die Angriffe auf Geräte interessieren. Es beginnt mit einer Einführung in eingebettete Systeme und deren Bedrohungen sowie den Hardware-Schnittstellen. Leserinnen und Leser erhalten wertvolle theoretische Grundlagen und praktische Anleitungen zur Einrichtung eines Testlabors. Durch reale Beispiele und praktische Übungen können die Leser verschiedene Angriffe, wie Seitenkanal- und Fehlereinspritzangriffe, an echten Geräten durchführen. Die Autoren erläutern Techniken wie Spannungsglitching, Taktglitching sowie die Analyse von Stromverbrauch und Differenzialfehleranalysen. Dieses Buch ist eine wertvolle Ressource für alle, die ein tieferes Verständnis für die Sicherheitsanforderungen und Angriffsmöglichkeiten in der Welt der eingebetteten Systeme erlangen möchten.
prodImage
37,50
37,50
Versand: frei!
Versand: frei!
prodImage
29,99
Versand: frei!
prodImage
35,99
Versand: frei!
prodImage
35,99
Versand: frei!
prodImage
37,50
Versand: frei!
mozilla/5.0 applewebkit/537.36 (khtml, like gecko; compatible; claudebot/1.0; [email protected])
x-pixel